• Title/Summary/Keyword: 첨단 보안

Search Result 147, Processing Time 0.017 seconds

A Study on the Discrimination Criteria of AMOLED-related Patents, a National Core Technology of Display Industry (디스플레이 분야 국가핵심기술인 AMOLED 관련 특허의 판별 기준 연구)

  • Se Hee Pak;Hang Bae Chang
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.105-121
    • /
    • 2024
  • Korea operates a national core technology system to protect important technologies at the national level. In the administrative procedures of the nation's core technology, the deliberation process conducted by qualitative evaluation by related industry experts is important. As the need for timely and appropriate technology protection increased, the need to shorten the time required for administrative procedures related to the designation and removal of national core technologies was raised. Therefore, this study studied the criteria for identifying patents related to national core technologies. For AMOLED, a national core technology in the display field, LDA topic modeling was applied to related news and papers to derive important technology and its trends, and mapped to AMOLED advanced technology processes under Article 5 of the Industrial Development Act to prepare criteria for discrimination. Since then, objective verification has been conducted through AMOLED national core technology patents already known. Through this study, patents related to AMOLED national core technologies can be identified, which can shorten the time for related administrative procedures.

South Korea's Defense Industry Development Strategy - Focusing on Technology Protection Policy - (한국의 방위산업 발전전략 연구 - 기술보호정책을 중심으로 -)

  • Geum-Ryul Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.83-93
    • /
    • 2024
  • As the paradigm of the global defense industry changes due to the Russia-Ukraine war, Korea's cutting-edge conventional weapons systems are attracting attention from around the world. In 2023, Korea ranked 9th in world arms exports, and is pursuing innovation in the defense industry with the goal of becoming the world's 4th largest defense exporter by 2027. The defense industry is a national strategic industry that requires a long period of time and a large budget, and defense technology is a core technology that has a great impact on the advancement of defense and the national economy. Over the past five years, Korea has suffered economic losses worth approximately 25 trillion won due to the outflow of cutting-edge technology overseas, and there is an urgent need for institutional improvement to prevent the outflow of defense technology. Therefore, this study presented Korea's defense industry development strategy by examining the laws and systems that the three key players in the Indo-Pacific region, the United States, China, and Japan, are promoting to protect defense industry technology. To foster the defense industry as a promising future industry in Korea, it is necessary to respond to the fast-evolving pace of development of advanced science and technology in connection with securing technological sovereignty and protect defense technology, which is a key technology of the country, by improving related laws and systems.

A Study on Industrial Security Outflow Prevention System Based on Network Biometric Authentication (네트워크 바이오 인증 기반 산업기술 유출방지 시스템에 관한 연구)

  • Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.31-36
    • /
    • 2011
  • Enterprise which has a core technology or organization which manages a core information will be walking into a critical situation like a ruins when organization's confidential information is outflowed. In the past confidential information that was leaked to the off-line, recently the outflow made possible through a variety of equipment at any time via the network based on the ubiquitous communication environment. In this paper, we propose to authenticate and block all packets transmitted via the network at real-time in order to prevent confidentials outflow. Especially in or der to differentiate between users who attempt to disclose confidentials, we propose to insert user's biometric informaion transparently at per-packet basis, and also verify a performance by simulation.

A study on the appropriateness of utilizing retired persons to military education and training sector (군사 교육훈련분야의 예비역 활용 적정성에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.27-34
    • /
    • 2014
  • This study is changing day by day in Korea, which reinforce the security environment and other advanced weapon systems and operate to secure it in excellent staff Reserves are being utilized in each group for the service pipe work required to determine the appropriateness of the Job Title, Retired military expertise and experience in utilizing the scarce human resources contribute to the improvement of the reinforcement of Power, Reserves required by each group's employment services and the need to normalize operations and annual operating plan objectives for determining the adequacy of the data to provide you with. In particular, the group has a direct impact on attack power can be trained to perform combat missions need to empower bag in bag research focuses on methods to improve and complement suggested.

A Study for Ammunition Integrated Logistics Support System Development (탄약종합군수지원 업무체계 발전에 관한 연구)

  • Han, Ho Seok;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.23-30
    • /
    • 2015
  • Integrated Logistics Support can effectively respond to future wars and through the smooth logistics support activities bring a win in wars. Future warfare is very complex compare to Modern Warfare and required high level of strategies and tactics. Also, it is expected that the future war will be high-intensity war using high-tech weapon systems. Therefore, in this study, I look forward to the effective logistic support through the development of ammunition integrated logistics support which is a part of integrated logistics support(ILS). In addition, by studying a step-by-step system and supporting element of ammunition integrated logistics support, we can find the errors related to ammunition integrated logistics support system and suggest the direction to improve the system.

A Study of IT Convergence Technology For Health Exercise (건강운동을 위한 IT 융합기술의 접근 동향)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.77-82
    • /
    • 2015
  • IT convergence has been approached from national strategic dimension with an aim to drive forward technology development and industrial advancement in other fields by taking the IT to the next advanced level, and has been the focus of intensive investment of research resources. Against this backdrop, IT convergence has emerged as a cutting-edge convergence industry that helps spur development of new growth engine being pushed forward at inter-ministerial level, as well as help turn the mainstay industries into high value-added industries and create new IT industry. Health-related convergence services have shifted its focus towards the exercise/sports and rehabilitation-oriented entertainment experiential industry away from conventional disease prevention and control-centric treatment/therapy technology industry. Thus, this study was intended to examine the trends of IT convergence technological development related to health exercise and present recommendation on the future course for development of major technologies and advancement of convergence industry, given the importance assigned to IT convergence.

A study of KREONET Promotion through Analysis of User Satisfaction Investigation (고객만족도 조사 분석을 통한 국가과학기술연구망(KREONET) 활성화 방안 연구)

  • Kwon, Woo Chang;Lee, Myung Sun;Park, Byung Yeon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.181-187
    • /
    • 2016
  • KREONET is a national research network that supports research and development of advanced scientific application for about 200 KREONET members including national research institute, government office, university and research institution of commercial company with high performance networking service. In order to fulfil user satisfaction, this paper provides a solution for the issues in KREOENT service through investigating problems and analyzing user satisfaction survey during 2014 and 2015. Moreover it offers KREONET promotion strategy with user customization service.

A Study on the Algorithms of One-way Transmission for Stable Data Sharing (안정적인 데이터 공유를 위한 일방향 전송 알고리즘에 대한 연구)

  • Kang, Min Kyung;Koh, Keun Ho;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.61-68
    • /
    • 2016
  • As many high-tech researches are shown in various field by sharing data via computer network, a necessity for stable data-sharing environment has suggested steadily. This research covers one-way communication protocol which is newly developed through the necessity. In this protocol, data is transmitted only in one way. One-way transmission has strong possibility to protect system from uncertain and potential risk, but it is impossible to receive ACK(Acknowledge Character) packet about data. Therefore, we need to find a way which duplex protocol such as TCP, ICMP works properly and practical communication falls under one-way transmission environment. To conclude, we analysed possible scenario in each protocol from three layers - interface layer, internet layer and transmission layer and approached how to resolve the problem in each way.

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

Patient Authentication System for Medical Information Security using RFID (의료정보보호를 위한 RFID를 이용한 환자 인증 시스템)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.962-969
    • /
    • 2010
  • Recently, RFID technology can successfully be used to reduce medical errors. This technology can aid in the accurate matching of patients with their medications and treatments. The enthusiasm for using RFID technology in medical settings has been tempered by privacy concerns. In this paper, we propose a secure and efficient RFID authentication system to not only authenticate patients' authenticity but also protect patients' personal medical informations. The proposed system consists of RFID-based patient authentication protocol and database security protocol. As a result, since the proposed RFID authentication system provides strong security and efficiency, it can be used practically for patient authentication and personal medical information protection on the high technology medical environments such as u-Hospital and u-Healthcare.